What is the servers single loss expectancy (SLE) value?
Larry is in charge of presenting risk assessment calculations to his boss by the end of the week. He concludes that a server with heavy traffic has an annualized loss expectancy (ALE) of $15,000 with an annualized rate of occurrence (ARO) of 5. What is the servers single loss expectancy (SLE) value?
which of the following main concepts of information security?
Denial of service and loss of services due to disasters are two issues that are primarily linked to which of the following main concepts of information security?
What is the best reason for this mandate?
Your companys CIO has stressed the need for an immediate incident response plan to be created. What is the best reason for this mandate?
This tactic would best be characterized as:
During a post-mortem incident evaluation, it is discovered that coercion was used by an attacker to infiltrate the company and obtain confidential information. This tactic would best be characterized as:
What tactic is Roger using?
Roger calls into a customer service center and pretends to be affiliated with the company in order to gain secured information. What tactic is Roger using?
What is the purpose of Mikes new position?
Mike, who was a help desk support person, has recently been moved into the position of security awareness trainer. What is the purpose of Mikes new position?
Which duty would be considered “out of scope” in her position?
Kim is a data custodian for her company. She has many duties to perform each day. Which duty would be considered "out of scope" in her position?
The security policy that Tom is publishing could include all of the following initiatives except:
Tom has just completed the companys first-ever security policy after getting final sign-off from the executive committee. The security policy that Tom is publishing could include all of the following initiatives except:
Which of the following best describes why this is put into place?
A government contracting firm uses classification levels within its data networking environment. Which of the following best describes why this is put into place?
who is most likely the owner of this data?
In a heated debate between the IT department, operations, and the finance department, the issue of who "owns" the financial data in question is raised. Of the entities listed below, who is most likely the owner of this data?